Analysis

  • max time kernel
    77s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2023, 01:31

General

  • Target

    85ca2781c8a1bde0e30d8b1e40b3877b39a697c0410a5f36bda180cc56b92e73.exe

  • Size

    660KB

  • MD5

    1e61df9d1f6b31c01a9006706d7df272

  • SHA1

    d2b8b2bb05d9de48422fd30b0cfa394be149774a

  • SHA256

    85ca2781c8a1bde0e30d8b1e40b3877b39a697c0410a5f36bda180cc56b92e73

  • SHA512

    d142e2b85200b2aab854917ae3ab908de59b23dd12f3f1f3d6268f6cc086dcc88e498c80f97383f5b368b69ca089e92a030c740a29f5cd7b099233f6ff49497b

  • SSDEEP

    12288:JMrUy90OBPUvmxXfOQbNcPhUGvGLOv1bvgJzbJ6Sft:5ylBsvEXGQbuP63PdFft

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ca2781c8a1bde0e30d8b1e40b3877b39a697c0410a5f36bda180cc56b92e73.exe
    "C:\Users\Admin\AppData\Local\Temp\85ca2781c8a1bde0e30d8b1e40b3877b39a697c0410a5f36bda180cc56b92e73.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yczr98mc75.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yczr98mc75.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urqP83RX34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urqP83RX34.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 1084
          4⤵
          • Program crash
          PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrOc25xM92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrOc25xM92.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 1380
          4⤵
          • Program crash
          PID:1844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuur88Fw19.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuur88Fw19.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2192 -ip 2192
    1⤵
      PID:3968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3436 -ip 3436
      1⤵
        PID:2324

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuur88Fw19.exe

              Filesize

              175KB

              MD5

              75ced8ad0d8cd237ebc9cb7b00852651

              SHA1

              adab63df3e0a40fd9f170ab57da66f01f226141c

              SHA256

              a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

              SHA512

              f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuur88Fw19.exe

              Filesize

              175KB

              MD5

              75ced8ad0d8cd237ebc9cb7b00852651

              SHA1

              adab63df3e0a40fd9f170ab57da66f01f226141c

              SHA256

              a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

              SHA512

              f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yczr98mc75.exe

              Filesize

              515KB

              MD5

              cd82caf760ffdc30cb7c817dc4ef9314

              SHA1

              f042b4e2a81370aba1123c04c4418bb426b58cff

              SHA256

              6bc2e58046cf7fca5d3141a8c3c9234f0363563cde799ee89879411ad82ed16a

              SHA512

              ddd222e7e78ad4cba55c4dee85742537d3124c447e7191577a765bf3e4c291f7f11156c567aebbeecba3240424b7a4b9464a8482dfbbd393a73f0eaebf317886

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yczr98mc75.exe

              Filesize

              515KB

              MD5

              cd82caf760ffdc30cb7c817dc4ef9314

              SHA1

              f042b4e2a81370aba1123c04c4418bb426b58cff

              SHA256

              6bc2e58046cf7fca5d3141a8c3c9234f0363563cde799ee89879411ad82ed16a

              SHA512

              ddd222e7e78ad4cba55c4dee85742537d3124c447e7191577a765bf3e4c291f7f11156c567aebbeecba3240424b7a4b9464a8482dfbbd393a73f0eaebf317886

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urqP83RX34.exe

              Filesize

              232KB

              MD5

              db3ab3357fc347e4ca262d7a8cf6f90f

              SHA1

              517fef5bb4d3246dd817765cdb7747b0580973b4

              SHA256

              e03720c814f0a4c343c5f49e4d8e53f9ee71d7a6412c93b5bdb1ac58e80eddad

              SHA512

              f7d7b8e7850b0f00381619e1f8776d1885e43f489b4786daaeea4a5a8b2d278b10cc0a693b32ff4023bbee1e8a6f8e51e227ce97ac8a0d201f8f43efe772e97f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urqP83RX34.exe

              Filesize

              232KB

              MD5

              db3ab3357fc347e4ca262d7a8cf6f90f

              SHA1

              517fef5bb4d3246dd817765cdb7747b0580973b4

              SHA256

              e03720c814f0a4c343c5f49e4d8e53f9ee71d7a6412c93b5bdb1ac58e80eddad

              SHA512

              f7d7b8e7850b0f00381619e1f8776d1885e43f489b4786daaeea4a5a8b2d278b10cc0a693b32ff4023bbee1e8a6f8e51e227ce97ac8a0d201f8f43efe772e97f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrOc25xM92.exe

              Filesize

              290KB

              MD5

              1ef58e21a15e90d73d400e2b62b17256

              SHA1

              5ac56358af1c665c89dda115587a5360fecb841a

              SHA256

              1406756fb455734d1a168cecfb2312e43937ed84153f6578d11d8c30729af209

              SHA512

              302fda42de2c9fa1ba22f4be5630b25c33abcacf576b040abf5df26f9acefb68f5eeddcc21bac6086d9e43fd92dfe31969251f2b74de2e441c0cce7cf9cd08f8

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrOc25xM92.exe

              Filesize

              290KB

              MD5

              1ef58e21a15e90d73d400e2b62b17256

              SHA1

              5ac56358af1c665c89dda115587a5360fecb841a

              SHA256

              1406756fb455734d1a168cecfb2312e43937ed84153f6578d11d8c30729af209

              SHA512

              302fda42de2c9fa1ba22f4be5630b25c33abcacf576b040abf5df26f9acefb68f5eeddcc21bac6086d9e43fd92dfe31969251f2b74de2e441c0cce7cf9cd08f8

            • memory/1072-1122-0x00000000004E0000-0x0000000000512000-memory.dmp

              Filesize

              200KB

            • memory/1072-1123-0x00000000050D0000-0x00000000050E0000-memory.dmp

              Filesize

              64KB

            • memory/2192-160-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-170-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-154-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/2192-155-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-156-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-158-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-153-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/2192-162-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-164-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-166-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-168-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-152-0x0000000000650000-0x000000000067D000-memory.dmp

              Filesize

              180KB

            • memory/2192-172-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-174-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-176-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-178-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-180-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-182-0x0000000002690000-0x00000000026A2000-memory.dmp

              Filesize

              72KB

            • memory/2192-183-0x0000000000400000-0x000000000057E000-memory.dmp

              Filesize

              1.5MB

            • memory/2192-184-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/2192-185-0x0000000004C10000-0x0000000004C20000-memory.dmp

              Filesize

              64KB

            • memory/2192-187-0x0000000000400000-0x000000000057E000-memory.dmp

              Filesize

              1.5MB

            • memory/2192-151-0x0000000004C20000-0x00000000051C4000-memory.dmp

              Filesize

              5.6MB

            • memory/3436-195-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-224-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-197-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-199-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-201-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-203-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-205-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-207-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-208-0x00000000006C0000-0x000000000070B000-memory.dmp

              Filesize

              300KB

            • memory/3436-210-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-211-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-214-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-212-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-216-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-218-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-220-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-222-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-193-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-226-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-228-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-1101-0x00000000052D0000-0x00000000058E8000-memory.dmp

              Filesize

              6.1MB

            • memory/3436-1102-0x0000000005970000-0x0000000005A7A000-memory.dmp

              Filesize

              1.0MB

            • memory/3436-1103-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

              Filesize

              72KB

            • memory/3436-1104-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

              Filesize

              240KB

            • memory/3436-1105-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-1107-0x0000000005DD0000-0x0000000005E36000-memory.dmp

              Filesize

              408KB

            • memory/3436-1108-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-1109-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-1110-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB

            • memory/3436-1111-0x00000000064A0000-0x0000000006532000-memory.dmp

              Filesize

              584KB

            • memory/3436-1112-0x00000000067C0000-0x0000000006982000-memory.dmp

              Filesize

              1.8MB

            • memory/3436-1113-0x00000000069A0000-0x0000000006ECC000-memory.dmp

              Filesize

              5.2MB

            • memory/3436-192-0x0000000002700000-0x000000000273E000-memory.dmp

              Filesize

              248KB

            • memory/3436-1114-0x0000000007010000-0x0000000007086000-memory.dmp

              Filesize

              472KB

            • memory/3436-1115-0x0000000007090000-0x00000000070E0000-memory.dmp

              Filesize

              320KB

            • memory/3436-1116-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

              Filesize

              64KB